Upgrading from Forefront Identity Manager to Microsoft Identity Manager
Microsoft Identity Manager 2016 (MIM) brings both continuity and innovation to Microsoft’s on-premises identity management platform. What is the impact of MIM on existing users of FIM 2010? Read more…
Taking Control of your Active Directory Service Accounts
Learn about steps your organization can take to improve Service Account security – all without additional infrastructure or costs, as well as best practices for minimizing risks. Read more…
John Craddock’s five star rated Identity Masterclass live via Zoom in US Eastern Time
John Craddock’s Microsoft Identity Masterclass consistently gets 100% 5-star ratings – and you can now join the class live via Zoom in Eastern Time, 25 – 29 October, 2021. Read more…
Preparing your System Center Configuration Manager (SCCM) for Co-Management with Intune
The process for enabling co-management with Intune can be complex depending on your organization’s environment. Here are some helpful steps to help get you started. Read more…
OCG Christmas Screensavers – vintage technology which has stood the test of time
In the 1990s Oxford Computer Group developed a series of advent screensavers as an alternative to Christmas cards. They were designed as an amusing decoration during the festive season. They turned out to be phenomenally popular! Read more…
Saviynt Advanced Access Reviews: Capabilities and Definitions
Saviynt Security Manager’s advanced access review capabilities give organizations the flexibility to target access reviews effectively and efficiently. Read more…
Oxford Computer Group Announces Expanded Service Offerings and OASIS Managed Services Provider
Oxford Computer Group (OCG) is exited to announce the expansion of its Identity and Access Management services into Central America, with a new office in Santa Ana, Costa Rica. Read more…
How Does Continuous Access Evaluation Fit Into Your Zero Trust Strategy?
One of the principles of zero trust security is the concept of continuous authentication, wherein an end user’s or device’s session connectivity is continuously being monitored for changes. Read more…
The Evolution of IGA
Over the last few years, we have seen the merging of Identity Administration, Identity Governance, and Identity Analytics into Identity Governance and Administration (IGA). Now, the identity and governance landscapes are evolving even further. Read more…
Moving Beyond Basic Authentication
Basic authentication using username and password are not enough to protect your data. With the rise of credential stuffing and similar attacks, it is imperative that modern authentication with MFA be adopted by all. Read more…